Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Hackers Spread Malware With Blockchain

October 17, 2025
Reading Time: 3 mins read
in Alerts
Sothebys Data Breach Exposes Customers

A threat actor known as UNC5142 has been abusing blockchain smart contracts to facilitate the distribution of several information-stealing malware strains, such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar. This campaign targets both Windows and Apple macOS operating systems. UNC5142 is characterized by exploiting vulnerable WordPress websites and utilizing a technique dubbed ‘EtherHiding,’ which obscures malicious code or data by placing it on a public blockchain, specifically the BNB Smart Chain (BSC). First documented in late 2023, EtherHiding allows the malware to blend in with legitimate Web3 traffic, making the operation more resilient to detection and takedown efforts. Google Threat Intelligence Group (GTIG) reported having flagged about 14,000 web pages with injected JavaScript tied to UNC5142 as of mid-2025, suggesting a wide-ranging, indiscriminate attack.

The core mechanism of these attacks revolves around a multi-stage JavaScript downloader called CLEARSHORT, which is an assessed variant of the ClearFake framework. The attack begins with a first-stage JavaScript malware injected into compromised WordPress sites’ files or database. This script interacts with a malicious smart contract on the BSC blockchain to retrieve the second-stage payload. The smart contract, in turn, fetches an encrypted CLEARSHORT landing page from an external server, often a Cloudflare .dev page. This landing page uses the ClickFix social engineering tactic, deceiving victims into running malicious commands in the Windows Run dialog or the macOS Terminal app, ultimately leading to system infection with a stealer.

The infection chain adapts to the target’s operating system. On Windows, the malicious command executes an HTML Application (HTA) file, which then drops a PowerShell script to fetch the final, encrypted stealer payload from platforms like GitHub or MediaFire. Crucially, this script runs the stealer directly in memory, avoiding writing the file to the disk to bypass defenses. For attacks observed targeting macOS users, the ClickFix decoy prompts the victim to execute a bash command on the Terminal. This command downloads a shell script which then uses the curl command to retrieve the Atomic Stealer payload from a remote server, completing the infection.

Over the past year, UNC5142’s campaigns have shown considerable evolution, moving from a single-contract system to a more sophisticated three-smart contract architecture beginning in late 2024. This new design is based on the legitimate proxy pattern—a highly efficient Router-Logic-Storage setup—with each contract having a specific job. This structure provides operational agility, allowing the threat actors to rapidly update critical components like the landing page URL or decryption key by simply altering the mutable data within the smart contract, all without modifying the JavaScript on the compromised WordPress websites. This process is surprisingly cost-effective, costing only a small network fee for each update.

GTIG’s analysis of the blockchain infrastructure revealed the use of two distinct sets of smart contracts: a primary Main infrastructure established in late 2024, and a parallel Secondary infrastructure funded in early 2025. The Main infrastructure serves as the core campaign backbone, while the Secondary one appears to be a more tactical deployment, likely used to test new lures, support activity surges, or simply enhance overall resilience. Given the consistent operational tempo, the high volume of hacked websites, the frequent updates to the infection chain, and the diversity of distributed malware payloads, UNC5142 is assessed to have achieved a notable degree of success with its ongoing financially motivated operations.

Reference:

  • Hackers Abuse Blockchain Smart Contracts To Spread Malware Through WordPress Sites
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Sothebys Data Breach Exposes Customers

Microsoft Pulls 200 Suspicious Certificates

October 17, 2025
Sothebys Data Breach Exposes Customers

NK Hackers Hide Malware In Blockchain

October 17, 2025

Fortinet And Ivanti Patch Severe Flaws

October 16, 2025

Malicious VSCode Extensions Steal Crypto

October 16, 2025

Fake Password Manager Hijack PCs

October 16, 2025
Android Flaw Lets Apps Steal 2FA Codes

Android Flaw Lets Apps Steal 2FA Codes

October 15, 2025

Latest Alerts

Microsoft Pulls 200 Suspicious Certificates

NK Hackers Hide Malware In Blockchain

Hackers Spread Malware With Blockchain

Fortinet And Ivanti Patch Severe Flaws

Malicious VSCode Extensions Steal Crypto

Fake Password Manager Hijack PCs

Subscribe to our newsletter

    Latest Incidents

    Pro Hamas Hackers Target Airport Speakers

    Prosper Breach Hits 17 Million Accounts

    Sothebys Data Breach Exposes Customers

    F5 Reports Hackers Stole Source Code

    YouTube Down Globally With Playback Errors

    Spanish Retailer Mango Discloses Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial